Bug 2005997
Summary: | SELinux domain container_logreader_t does not have a policy to follow sym links for log files | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Todd Johnson <toddjohn> |
Component: | Containers | Assignee: | Jindrich Novy <jnovy> |
Status: | CLOSED ERRATA | QA Contact: | pmali |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 4.7 | CC: | aos-bugs, dwalsh, jnovy, miabbott, novyjindrich, tsweeney |
Target Milestone: | --- | ||
Target Release: | 4.10.0 | ||
Hardware: | noarch | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | container-selinux-2.169.0-1.el9 | Doc Type: | Bug Fix |
Doc Text: |
Cause: missing allow rules in policy
Consequence: /var/log/containers log files unreadable
Fix: https://github.com/containers/container-selinux/releases/tag/v2.169.0
Result: fixed
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-03-10 16:12:09 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Todd Johnson
2021-09-20 16:07:48 UTC
@dwalsh can you take a look at this and assign it to yourself, please? The Bugzilla system isn't letting me change assignees at the moment. We only rebase for EUS releases, and only if it is definitely a show stopper, IE No workaround. This is the type enforcement file I created to work around the problem: module logreader-links 1.0; require { type container_logreader_t; class lnk_file getattr; class lnk_file read; attribute logfile; } #============= container_logreader_t ============== allow container_logreader_t logfile : lnk_file {getattr read}; From what I can tell, the fix is included the the el9 RPM. Since this fix is important for logging agent pods, will this fix be back ported to existing RHEL/RH Coreos versions that are used for openshift worker nodes? Todd, Unless this is a blocker, I don't believe this will be backported to RH Coreos. However @miabbott would have the definitive answer there. (In reply to Tom Sweeney from comment #17) > Todd, > > Unless this is a blocker, I don't believe this will be backported to RH > Coreos. However @miabbott would have the definitive answer there. Based on the private comments on this BZ, there are no plans to backport this into RHEL 8.4, so it is not likely to land in any existing RHCOS/OCP releases. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.10.3 security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:0056 |